Cyber Security Awareness and Vulnerabilities Blog

RSS

20180612_blog_orphanedaccounts.jpg

This column’s question comes from a SecureAuth+Core Security customer who heard about some of the technologies we offer and was unfamiliar with the term Orphaned Account.    “What exactly is an Orphaned Account, how do they happen, and why are they dangerous to security?”  Well,…

Read More

Six Steps to Pen Test

Pen Test with Core Impact

When conducting a penetration test, most testers will develop some type of process, and repeat that same process on every engagement. As I think through the basics of penetration testing, I believe that process can be broken up into six steps. They are:   Information…

Read More

Here is the summary of all exploits released since April 2nd, the last Dot Release: 16 Updates overall  9 Remote exploits 4 Client-Side exploits 3 Product updates Here is the list of published updates: Remote Exploits: Disk Pulse Enterprise GET Buffer Overflow Exploit Disk Savvy Enterprise Buffer Overflow Exploit DiskBoss Enterprise Buffer…

Read More

Do I need IGA.png

Identity Governance & Administration (IGA) is commonly defined as “the policy-based centralized orchestration of user identity management and access control. Identity governance helps support enterprise IT security and regulatory compliance.” Or put into simpler terms, it’s putting in place a solution to ensure that…

Read More

20180521-blog.jpg

Most organizations test their security systems and protocols on a regular basis - and your company is probably among those that do. So you may have heard terms like "Red,” “Blue," or even "Purple" teams being tossed around in the context of cybersecurity.…

Read More

Security So Easy .jpg

Much like how I complain that I’m not losing weight - even though my treadmill has become a clothing rack- security only works if you use it. And, yes, I know I picked on the sales guys (and girls) in the title but,…

Read More

blog BEC phishing.png

The 2018 Telstra Security Report uses data from more than 1,250 decision-makers globally to present a view into the most prevalent and pervasive types of security threat and recommend ways to combat them.   Malicious emails were the primary weapon of choice for cyber…

Read More

blog.jpg

Today, we are thrilled to announce the next step in our Identity Governance and Administration journey, the release of Core Access Assurance Suite 9.1. While not a major release, AAS 9.1 includes updated UX and UI changes which show our continued commitment to…

Read More

NEW blog identity sprawl banner.png

Last week, we discussed the potential problems businesses run into when it comes to identity sprawl. Now, this idea is not limited to just identities, but also the many devices each individual user has and could potentially bring on your network. So here comes…

Read More

NEW blog identity sprawl banner.png

The IT world is fairly familiar with the idea of sprawl – especially when it comes to the virtual machine and cloud worlds.  IT Admins, Database Admins, App Development teams, and others all spin up new machines instead of using shared space on…

Read More